RSS

2010-KCSE-TRIAL-COMPUTER-STUDIES-P1-001

09 Sep

CST-OP1-001

Name …………………………………… Adm. No/Index No…………………………………..

Candidate’s Signature …………………

Date ………………………………………

451/1

COMPUTER STUDIES

Paper 1

(Theory)

July/August 2010

2 ½ Hours

KENYA CERTIFICATE OF SECONDARY EDUCATION

Computer Studies

(Theory)

Paper 1

Instruction to Candidates

1) Write your name and admission number in the spaces provided above

2) Sign and write the date of examination in the spaces provided above

3) This paper consists of TWO sections; A and B

4) Answer ALL the questions in section A

5) Answer question 16 and any other THREE questions from section B

6) All answers should be written in the spaces provided on the question paper

For Official Use Only

Section Question Score
A 1 – 15
B 16
17
18
19
20
TOTAL

SECTION A: (40 MARKS)

1) List down six factors to consider when choosing an operating system (3mks) …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

2) Describe the ideal environment for a computer to work properly. (4mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

3) Distinguish between Tailor-made programs and Off-the-shelf packages (2mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

4) List four features of a user friendly program (2mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

iv) ……………………………………………………………………………………………

5) List down five factors to consider when buying an output device (5mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

iv) ……………………………………………………………………………………………

v) ……………………………………………………………………………………………

6) Give three types of special purpose memories (1½mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

7) Explain the following field properties as used in Ms Access (2mks)

a) Caption ……………………………………………………………………………… ………………………………………..………………………………………………………

b) Input mask …………………………………………………………………………………… ……………………………………………………………………………………………….

8) Define the following terms as used on the Net

a) Firewall (1mk) ………………………………………………………………………………………………………………………………………………………………………………………………..

b) URL (1mk) ……………………………………………………………………………………………………………………………………………………………………………………………….

c) Search engine (1mk) …………………………………………………………………………………………………………………………………………………………………………………………….

d) Intranet (1mk) ……………………………………………………………………………………………………………………………………………………………………………………………

9) Distinguish between data privacy and data integrity (2mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

10)

a) Define the following as used in Ms Excel (1½mks)

i) Labels ……………………………………………………………………………………. …………………………………………………………………………………………

ii) Values …………………………………………………………………………………… …………………………………………………………………………………………

iii) Functions ……………………………………………………………………………… …………………………………………………………………………………………

b) Explain the following terms as used in reference to computer memory and size (2mks)

i) Bit ………………………………………………………………………………………… …………………………………………………………………………………………….

ii) A nibble ………………………………………………………………………………… ………………………………………………………………………………………….

iii) Byte ……………………………………………………………………………………… ……………………………………………………………………………………………

iv) A word …………………………………………………………………………………… ……………………………………………………………………………………………

11) Define a computer system (1mk) ………………………………………………………………………………………………………………………………………………………………………………………………….

12) State and explain three components of the computer system (3mks)

i) …………………………………………………………………………………………………………………………………………………………………………………………

ii) ………………………………………………………………………………………………………………………………………………………………………………………….

iii) ………………………………………………………………………………………………………………………………………………………………………………………….

13) State four functions of an operating system (2mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

iv) …………………………………………………………………………………………….

14) List three factors to consider when choosing an operating system (3mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

15) Covert 37.37510 to binary (2mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

SECTION B (60 MARKS)

Answer question 16 and any other three from this section

16)

a) Draw a flowchart for a program used to enter two numbers. The program should find the sum and average then display the output on the screen (6mks)

b) Write a pseudo code to represent the flowchart drawn above (6mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

c) State the three groups targeted when documenting a program (3mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) …………………………………………………………………………………………….

17)

a) Use the spreadsheet below to answer the questions that follow:

A B C D E
1 NAME POSITION GRADE SALARY
2 Opondi Manager 1 70,000
3 Njeri Cook 7 12,000
4 Ruto Clerk 3 25,000
5 Rono Watchman 8 10,000
6
7

Write a formula in the appropriate cells using cell referencing to obtain

i) Total number of employees (1mk) ………………………………………………………………………………………………………………………………………………………………………………………..

ii) Amount spent on salaries (1mk) ……………………………………………………………………………………………………………………………………………………………………………………….

iii) Minimum salary paid (1mk) ………………………………………………………………………………………………………………………………………………………………………………………..

b) State two ways of erasing the contents of a cell in a worksheet (2mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

c)

i) What is a system (2mks) …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

ii) State and explain four characteristics of systems (8mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

18)

a) Define the term feasibility study and explain four types of feasibility study (10mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

b) Discuss fully the interview method of gathering information (5mks) …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

19)

a) Explain three methods of data processing (6mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

b) Explain three changeover strategies used in implementing a new system (6mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

c) Using two’s complement, calculate 35 – 15 in binary form (3mks) …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

20)

a) What are likely causes of data and program loss in a computer (6mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

b) How can one safeguard his computer against data and program loss? (6mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

c) What are the circumstances which may lead to developing of a new information system? (3mks)

i) ………………………………………………………………………………………………………………………………………………………………………………………..

ii) …………………………………………………………………………………………………………………………………………………………………………………………

iii) ……………………………………………………………………………………………………………………………………………………………………………………….

 
Leave a comment

Posted by on September 9, 2010 in Computer Science, Paper 1

 

Tags:

Comments are closed.

 
%d bloggers like this: